Sciweavers

418 search results - page 65 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
POST
2012
218views more  POST 2012»
12 years 3 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
COMPSAC
2006
IEEE
14 years 1 months ago
Tool Support to Model-based Quality Analysis of Software Architecture
This paper presents an automated software tool SQUARE (Software QUality and ARchitecture modelling Environment). It is designed and implemented to support the analysis of software...
Qian Zhang, Jian Wu, Hong Zhu
SIGSOFT
2003
ACM
14 years 8 months ago
Behaviour model elaboration using partial labelled transition systems
State machine based formalisms such as labelled transition systems (LTS) are generally assumed to be complete descriptions m behaviour at some level of abstraction: if a labelled ...
Sebastián Uchitel, Jeff Kramer, Jeff Magee
REFLECTION
2001
Springer
13 years 12 months ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
IPMI
1999
Springer
13 years 11 months ago
The Distribution of Target Registration Error in Rigid-Body, Point-Based Registration
—Guidance systems designed for neurosurgery, hip surgery, spine surgery and for approaches to other anatomy that is relatively rigid can use rigid-body transformations to accompl...
Jay B. West, J. Michael Fitzpatrick